The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Smart IoT applications require connecting multiple IoT devices and networks with multiple services running in fog and cloud computing platforms. One approach to connecting IoT devices with cloud and fog services is to create a federated virtual network. The main benefit of this approach is that IoT devices can then interact with multiple remote services using an application specific federated network...
The rising of the Internet of Thing has imposed new challenges for the Future Internet to cover the specific requirements in terms of simplicity, low-power, and addressing flexibility. In this paper we present an architecture that allows network elements (things) to reach each other in terms of their identities instead of addresses or flat labels. Thus, the network entities are addressed in a natural...
IPv6 over low-power wireless personal area networks (6LoWPAN), composed by large number of constrained devices with wireless communication ability, are becoming more and more important, not only because their reduced cost but also a lot of real world applications and their ability to connect to IP networks. Since devices in 6LoWPAN are expected to be deployed in extremely large numbers and they are...
In the existing IPSec architecture, in which tunnel is built in kernel, the number of concurrent tunnels is restricted by IP address configured on the machine and user can not control the process of establishing tunnel. This brings inconvenience when we use personal computer to measure the performance parameters of VPN Gateway (e.g. the maximum number of concurrent tunnels and the maximum rate of...
In this paper, we propose a secure system model for interconnection between P2PSIP and IMS domains. The interworking solution is based on P2P-IMS GateWay (PIGW), which acts as a normal peer in P2PSIP network and a 3rd party IMS Application Server (AS) in IMS network. The security is achieved by implementing Chord Secure Proxy (CSP) and enhanced with subjective logic based trust model. We also implement...
Aiming at the security requirement of the Intranet that is different from Internet, an security architecture for Intranet is proposed. In physical layer and data link layer, based on network switch the intranet is divided into several parts separated from each other as required. In network layer, making use of the NAT gateway integrated in virtual server the intranet or its part is hidden to ensure...
We've long heard about the wide functionality that home automation technologies offer for improving our lives and securing our houses. However, price and an unstable domotics market have restricted such systems' deployment. Nowadays, companies offer too technology-dependent solutions that don't cover user demands completely. Meanwhile, research works focus on small innovations on specific parts of...
IP multicast originally works in any source multicast (ASM) that comes with great burden and dynamics on the backbone routers and weakness in inter-domain scalability. It also brought serious security and management problems. In contrast, source-specific multicast (SSM) has been recognized as a simple, scalable and secure method, especially in inter-domain multicast. However, its applicability to...
Driven by the need for multivendor interoperability of femtocell devices and their supporting infrastructure equipment, the cdma2000reg standards community has been undertaking a large-scale and comprehensive effort to develop industry standards for femtocell devices and systems based on the cdma2000 family of radio access technologies. This article describes those standardization activities and provides...
Distributed firewalls have been developed in order to provide networks with a higher level of protection than traditional firewalling mechanisms like gateway and host-based firewalls. Although distributed firewalls provide higher security, they too have limitations. This work presents the design & implementation of a new distributed firewall model, based on stateful Cluster Security Gateway (CSG)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.